hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Xamarin — Reversing de aplicaciones Android
Medium
Xamarin — Reversing de aplicaciones Android
Xamarin es un framework de desarrollo de aplicaciones móviles que permite crear apps nativas para iOS y Android utilizando un lenguaje de…
hack and bug bounty
What can freelancers learn from the rebranding of twitter to X and how can these learnings help to…
Medium
What can freelancers learn from the rebranding of twitter to X and how can these learnings help to…
Rebranding is a significant step for any company, and there are several key takeaways that freelancers can learn from such initiatives to…
hack and bug bounty
PEN-300 OSEP Review — Offensive Security Experienced Penetration Tester
Medium
PEN-300 OSEP Review — Offensive Security Experienced Penetration Tester
Earlier this year, I passed the Offensive Security Experienced Penetration Tester (OSEP) certification exam. As with other 300-level courses from OffSec, this was a practical 48-hour exam following…
hack and bug bounty
Hacker’s Preference: Python!
Medium
Hacker’s Preference: Python!
Compelling factors propelling Python’s remarkable rise in popularity within the hacker community
hack and bug bounty
THM: Surfer
Medium
THM: Surfer
Woah, check out this radical app! Isn’t it narly dude? We’ve been surfing through some webpages and we want to get you on board too! They said this application has some functionality that is only…
hack and bug bounty
Protect your online/digital reputation against cyber-blackmail with the help of cybersecurity…
Medium
Protect your online/digital reputation against cyber-blackmail with the help of cybersecurity…
Protect your online/digital reputation against cyber-blackmail with the help of cybersecurity experts Introduction Our lives are deeply entwined with technology in the digital age, which offers us…
hack and bug bounty
Arcadia Joins ‘Skin in the Game,’ Enhancing Trust and Security in the Web3 Ecosystem
Medium
Arcadia Joins ‘Skin in the Game,’ Enhancing Trust and Security in the Web3 Ecosystem
In a significant move towards a more secure and trusted web3 environment, Arcadia, a prestigious web3 auditing and security company, has…
hack and bug bounty
Maximizing ROI: Why Investing in Purple Teaming Makes Sense
Medium
Maximizing ROI: Why Investing in Purple Teaming Makes Sense
In the ever-evolving landscape of cybersecurity, organizations face an ongoing battle to protect their digital assets from increasingly…
hack and bug bounty
THM — Epoch | 52/100
Medium
THM — Epoch | 52/100
Hi! Here is a writeup of Epoch from TryHackMe. This was a very beginner box that featured a command injection vulnerability which we were…
hack and bug bounty
Build no infrastructure, then we’ll talk
Medium
Build no infrastructure, then we’ll talk
We’re in this strange ol’ time where it feels like so many aspects of our lives are maintained by ubiquitous, real-time connectivity to the…
hack and bug bounty
Quick Guide for cyber security Pen Testing that can help :)
Medium
Quick Guide for cyber security Pen Testing that can help :)
If you are new and you want to learn everything from scratch this tutorial help you to understand thing Cyber Security and with basic…
hack and bug bounty
Performance testing of AppSec tools
Medium
Performance testing of AppSec tools
Performance testing of Application Security tools prior to production release is valuable because it helps to ensure that the tools are…
hack and bug bounty
InfoSecSherpa’s News Roundup for Monday, August 14, 2023
Medium
InfoSecSherpa’s News Roundup for Monday, August 14, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Navigating Ethical Hacking: Your Path to Becoming a Cybersecurity Professional
Medium
Navigating Ethical Hacking: Your Path to Becoming a Cybersecurity Professional
The field of ethical hacking offers an engaging introduction to cybersecurity, where people defend digital environments by comprehending…
hack and bug bounty
DNS Spoofing Attack Using Python
Medium
DNS Spoofing Attack Using Python
In this article, I will demonstrate how you can execute a DNS Spoofing Attack using the Python Language. First, we will implement an ARP…
hack and bug bounty
Windows — Securable Objects
Medium
Windows — Securable Objects
Overall, “securable objects” are Windows objects (https://medium.com/@boutnaru/windows-objects-2c289da600bf) that can have a “security…
hack and bug bounty
Unveiling Vulnerabilities: Host-header injection in OAuth Functionality
Medium
Unveiling Vulnerabilities: Host-header injection in OAuth Functionality
Introduction
hack and bug bounty
Critical XSS Vulnerability in Workflowy
Medium
Critical XSS Vulnerability in Workflowy
Exposes Users to Unauthorized Code Execution and Information Disclosure: Immediate Caution Advised
hack and bug bounty
Exploiting URL-Based Access Control: A Lab Analysis
Medium
Exploiting URL-Based Access Control: A Lab Analysis
Introduction: Greetings, infosec researchers!
hack and bug bounty
A Journey Close to RCE in Nokia
Medium
A Journey Close to RCE in Nokia
Hello everyone. In this article, I will share the story of how I came very close to discovering an RCE (Remote Code Execution)…